Analysis

  • max time kernel
    1785s
  • max time network
    1798s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-06-2022 16:19

General

  • Target

    47b27cb727b1ada6c65c7bf30b57537b26080f1f5a6730be91b767427945d731.exe

  • Size

    95KB

  • MD5

    31d2bdcd2fc117b558b54e731af02a65

  • SHA1

    c9ac5c713f8d67c72251ddf8a50691355a0fc259

  • SHA256

    47b27cb727b1ada6c65c7bf30b57537b26080f1f5a6730be91b767427945d731

  • SHA512

    f84fd89ab9fc82245906902029a247fabdbc999a1df8a7af911c3cd080a80868e478674b48982dad70f4a97c84a3692672903653ac33b97582324f2e056c3810

Score
10/10

Malware Config

Signatures

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47b27cb727b1ada6c65c7bf30b57537b26080f1f5a6730be91b767427945d731.exe
    "C:\Users\Admin\AppData\Local\Temp\47b27cb727b1ada6c65c7bf30b57537b26080f1f5a6730be91b767427945d731.exe"
    1⤵
      PID:1960

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1960-54-0x0000000075A61000-0x0000000075A63000-memory.dmp
      Filesize

      8KB